首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Impact of space systems capabilities and their role as critical infrastructure 空间系统能力的影响及其作为关键基础设施的作用
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-26 DOI: 10.1016/j.ijcip.2024.100680
Mr. Antonio Carlo , Dr. Paola Breda

The cyber domain has led to growth in current satellite capabilities, which have become essential due to the increased use of both civil and military critical infrastructure (CI) management systems. In recent decades, outer space has proven to be an increasingly critical sector for the international management of commercial CI, with private operators acting on both multi- and transnational levels. However, the space domain is characterised by not only opportunities but also risks and threats. As the security implications of space were not sufficiently considered at the beginning of the space era, some of the predominant risks currently extend into the commercial sphere. These risks must be considered to ensure the resilience of connected CIs in outer space. Security is a vital issue in the cyber and space domains and should be considered in every phase of a space system's life cycle, from the development and manufacturing of space assets to their deployment and end of life. This involves CI in several sectors, each of which exhibits different but interrelated risks. For example, telecommunications and location systems increasingly require the use of CI, which creates a fragile interdependence that is extremely vulnerable to threats. This paper underlines the importance of recognising space systems as CI and emphasises the need for a better integration of these assets in a system-of-systems analysis. The consequences of global satellite disruption on terrestrial CI are used to support this view. In such a disruptive scenario, mitigation measures based on in-orbit servicing or responsive space capabilities, for example, would allow CI to be restored to first ensure national security followed by commercial activities. Moreover, this paper provides an overview of the legal and policy aspects of using space systems’ capabilities in CI to better understand their implications and encourage the development of recommendations.

网络领域导致了当前卫星能力的增长,由于民用和军用关键基础设施(CI)管理系统的使用增加,卫星能力变得至关重要。近几十年来,外层空间已被证明是商业 CI 国际管理的一个日益重要的领域,私人运营商在多国和跨国层面上都采取了行动。然而,太空领域的特点不仅是机遇,还有风险和威胁。由于在太空时代之初没有充分考虑到太空的安全影响,目前一些主要风险已延伸到商业领域。必须考虑到这些风险,以确保外层空间中相互连接的 CI 的复原力。安全是网络和空间领域的一个重要问题,应在空间系统生命周期的每个阶段加以考虑,从空间资产的开发和制造到部署和报废。这涉及多个部门的计算机信息系统,每个部门都有不同但相互关联的风险。例如,电信和定位系统越来越多地需要使用 CI,这就形成了一种脆弱的相互依存关系,极易受到威胁。本文强调了将空间系统视为 CI 的重要性,并强调有必要在系统分析中更好地整合这些资产。本文利用全球卫星中断对地面 CI 造成的后果来支持这一观点。在这种破坏性情况下,基于在轨服务或响应性空间能力等的缓解措施将使 CI 得以恢复,首先确保国家安全,然后才是商业活动。此外,本文还概述了在 CI 中使用空间系统能力的法律和政策方面,以便更好地理解其影响,并鼓励提出建议。
{"title":"Impact of space systems capabilities and their role as critical infrastructure","authors":"Mr. Antonio Carlo ,&nbsp;Dr. Paola Breda","doi":"10.1016/j.ijcip.2024.100680","DOIUrl":"https://doi.org/10.1016/j.ijcip.2024.100680","url":null,"abstract":"<div><p>The cyber domain has led to growth in current satellite capabilities, which have become essential due to the increased use of both civil and military critical infrastructure (CI) management systems. In recent decades, outer space has proven to be an increasingly critical sector for the international management of commercial CI, with private operators acting on both multi- and transnational levels. However, the space domain is characterised by not only opportunities but also risks and threats. As the security implications of space were not sufficiently considered at the beginning of the space era, some of the predominant risks currently extend into the commercial sphere. These risks must be considered to ensure the resilience of connected CIs in outer space. Security is a vital issue in the cyber and space domains and should be considered in every phase of a space system's life cycle, from the development and manufacturing of space assets to their deployment and end of life. This involves CI in several sectors, each of which exhibits different but interrelated risks. For example, telecommunications and location systems increasingly require the use of CI, which creates a fragile interdependence that is extremely vulnerable to threats. This paper underlines the importance of recognising space systems as CI and emphasises the need for a better integration of these assets in a system-of-systems analysis. The consequences of global satellite disruption on terrestrial CI are used to support this view. In such a disruptive scenario, mitigation measures based on in-orbit servicing or responsive space capabilities, for example, would allow CI to be restored to first ensure national security followed by commercial activities. Moreover, this paper provides an overview of the legal and policy aspects of using space systems’ capabilities in CI to better understand their implications and encourage the development of recommendations.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100680"},"PeriodicalIF":3.6,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review 能源相关基础设施面临的网络安全和网络恐怖主义挑战--网络安全框架和经济学--全面审查
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-21 DOI: 10.1016/j.ijcip.2024.100677
Sampath Kumar Venkatachary , Jagdish Prasad , Annamalai Alagappan , Leo John Baptist Andrews , Raymon Antony Raj , Sarathkumar Duraisamy

This paper comprehensively reviews the challenges posed by cybersecurity and cyber-terrorism to energy-related infrastructures. The article highlights the difficulty in monitoring, managing, and measuring cybersecurity threats and discuss the critical need for analysis in this area, particularly in the energy sector, where control and command operations are conducted in an internetworked environment. Despite the energy industry's effective risk management practices, it remains vulnerable to cyber-terrorism, as evidenced by the Stuxnet attack. This hardware-software co-designed mechanism targeted Iranian nuclear facilities. The authors explore the technical aspects of Stuxnet and its impact on the energy sector, emphasising the need for proactive measures to mitigate the risks posed by cyber-terrorism. The economic implications of cyberattacks on energy infrastructures are also discussed, including the potential for significant financial losses and reputational damage. The authors provide practical guidance on preventive measures and defence mechanisms, such as network segmentation, access control, and encryption, to help prevent cyberattacks. In a nutshell, this paper serves as a timely and insightful reminder of the ongoing challenges faced by energy-related infrastructures in cybersecurity and cyber-terrorism. It underscores the need to continue developing effective risk management strategies and implementing appropriate measures to protect against cyber threats.

本文全面回顾了网络安全和网络恐怖主义给能源相关基础设施带来的挑战。文章强调了监控、管理和衡量网络安全威胁的难度,并讨论了在该领域进行分析的迫切需要,尤其是在能源行业,因为控制和指挥操作是在互联网环境下进行的。尽管能源行业采取了有效的风险管理措施,但仍然很容易受到网络恐怖主义的攻击,Stuxnet 攻击就是证明。这种由硬件和软件共同设计的机制针对的是伊朗的核设施。作者探讨了 Stuxnet 的技术问题及其对能源行业的影响,强调有必要采取积极主动的措施来降低网络恐怖主义带来的风险。作者还讨论了网络攻击对能源基础设施的经济影响,包括可能造成的重大经济损失和声誉损害。作者就网络分段、访问控制和加密等预防措施和防御机制提供了实用指导,以帮助防止网络攻击。总之,本文及时而深刻地提醒了能源相关基础设施在网络安全和网络恐怖主义方面所面临的持续挑战。它强调了继续制定有效的风险管理策略和实施适当措施以防范网络威胁的必要性。
{"title":"Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review","authors":"Sampath Kumar Venkatachary ,&nbsp;Jagdish Prasad ,&nbsp;Annamalai Alagappan ,&nbsp;Leo John Baptist Andrews ,&nbsp;Raymon Antony Raj ,&nbsp;Sarathkumar Duraisamy","doi":"10.1016/j.ijcip.2024.100677","DOIUrl":"10.1016/j.ijcip.2024.100677","url":null,"abstract":"<div><p>This paper comprehensively reviews the challenges posed by cybersecurity and cyber-terrorism to energy-related infrastructures. The article highlights the difficulty in monitoring, managing, and measuring cybersecurity threats and discuss the critical need for analysis in this area, particularly in the energy sector, where control and command operations are conducted in an internetworked environment. Despite the energy industry's effective risk management practices, it remains vulnerable to cyber-terrorism, as evidenced by the Stuxnet attack. This hardware-software co-designed mechanism targeted Iranian nuclear facilities. The authors explore the technical aspects of Stuxnet and its impact on the energy sector, emphasising the need for proactive measures to mitigate the risks posed by cyber-terrorism. The economic implications of cyberattacks on energy infrastructures are also discussed, including the potential for significant financial losses and reputational damage. The authors provide practical guidance on preventive measures and defence mechanisms, such as network segmentation, access control, and encryption, to help prevent cyberattacks. In a nutshell, this paper serves as a timely and insightful reminder of the ongoing challenges faced by energy-related infrastructures in cybersecurity and cyber-terrorism. It underscores the need to continue developing effective risk management strategies and implementing appropriate measures to protect against cyber threats.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100677"},"PeriodicalIF":3.6,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140796282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States 加拿大和美国陆上油气输送管道事故统计比较
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-20 DOI: 10.1016/j.ijcip.2024.100679
Y. Shen, W. Zhou

This study analyzes the mileage and incident data between 1995 and 2016 corresponding to the onshore oil and natural gas transmission pipelines regulated by the Canada Energy Regulator (CER) and Pipeline and Hazardous Materials Safety Administration (PHMSA) of the United States. The analysis indicates that the material/weld/equipment failure is the leading failure cause for both CER and PHMSA pipeline incidents. The annual average incident rates of the CER and PHMSA pipelines are in the order of 10−3 per km except for the PHMSA gas pipelines, the annual incident rate of which is in the order of 10−4 per km. The annual average rupture rates of the CER and PHMSA pipelines vary from 3.5 × 10−5 to 4.5 × 10−5 per km. The F-N curves for the PHMSA pipelines are developed based on the mileage and incident data to quantify the societal risks posed by the pipeline in general.

本研究分析了 1995 年至 2016 年间由加拿大能源监管局(CER)和美国管道与危险材料安全管理局(PHMSA)监管的陆上石油和天然气输送管道的里程和事故数据。分析表明,材料/焊缝/设备故障是 CER 和 PHMSA 管道事故的主要故障原因。CER 和 PHMSA 管道的年平均事故率约为每公里 10-3,但 PHMSA 天然气管道除外,其年事故率约为每公里 10-4。CER 和 PHMSA 管道的年平均破裂率从每公里 3.5 × 10-5 到 4.5 × 10-5 不等。PHMSA 管道的 F-N 曲线是根据里程和事故数据绘制的,用于量化管道的总体社会风险。
{"title":"A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States","authors":"Y. Shen,&nbsp;W. Zhou","doi":"10.1016/j.ijcip.2024.100679","DOIUrl":"10.1016/j.ijcip.2024.100679","url":null,"abstract":"<div><p>This study analyzes the mileage and incident data between 1995 and 2016 corresponding to the onshore oil and natural gas transmission pipelines regulated by the Canada Energy Regulator (CER) and Pipeline and Hazardous Materials Safety Administration (PHMSA) of the United States. The analysis indicates that the material/weld/equipment failure is the leading failure cause for both CER and PHMSA pipeline incidents. The annual average incident rates of the CER and PHMSA pipelines are in the order of 10<sup>−3</sup> per km except for the PHMSA gas pipelines, the annual incident rate of which is in the order of 10<sup>−4</sup> per km. The annual average rupture rates of the CER and PHMSA pipelines vary from 3.5 × 10<sup>−5</sup> to 4.5 × 10<sup>−5</sup> per km. The F-N curves for the PHMSA pipelines are developed based on the mileage and incident data to quantify the societal risks posed by the pipeline in general.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100679"},"PeriodicalIF":3.6,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000209/pdfft?md5=eddf33d8e539f2a2af96e60537f15885&pid=1-s2.0-S1874548224000209-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140770030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis 用于威胁建模和攻击矢量分析的火力发电厂硬件在环 (HIL) 试验台设计
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-17 DOI: 10.1016/j.ijcip.2024.100675
Midhya Mathew , Faruk Kazi

Industrial control systems (ICSs) are extensively utilized worldwide to control and regulate various processes in energy utilities. It consists of various field devices, control and monitoring devices and communication devices. This paper focuses on the testing and analysis of various attack vectors that could potentially occur in a hardware-in-loop (HIL) Industrial Control System (ICS) testbed designed for a 500 MW thermal power plant. In this testbed, four typical process scenarios have been identified that can be manipulated through cyber-attacks, leading to severe issues such as plant shutdown or even explosions. The four significant plant scenarios recognized include minimal coal mill levels and increased temperatures in the classifier, heightened primary airflow to the coal mill, the tripping of an ID fan, and adjustment of the Super-heater temperature to its lowest setting. Also, we utilize the STRIDE threat modeling methodology to accurately represents the elements of Cyber-Physical Systems (CPS), their inter-dependencies, and the potential attack entry points and system vulnerabilities.

工业控制系统(ICS)在全球范围内被广泛用于控制和调节能源公用事业中的各种流程。它由各种现场设备、控制和监控设备以及通信设备组成。本文的重点是测试和分析在为 500 兆瓦火力发电厂设计的硬件在环 (HIL) 工业控制系统 (ICS) 测试平台中可能出现的各种攻击向量。在该测试平台中,确定了四种典型的流程场景,可通过网络攻击进行操纵,从而导致严重问题,如工厂停工甚至爆炸。这四种重要的工厂场景包括:磨煤机煤位极低、分级机温度升高、磨煤机一次风量增大、ID 风机跳闸以及将超级加热器温度调整到最低设置。此外,我们还利用 STRIDE 威胁建模方法来准确表示网络物理系统 (CPS) 的要素、相互依赖关系以及潜在的攻击入口点和系统漏洞。
{"title":"Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis","authors":"Midhya Mathew ,&nbsp;Faruk Kazi","doi":"10.1016/j.ijcip.2024.100675","DOIUrl":"10.1016/j.ijcip.2024.100675","url":null,"abstract":"<div><p>Industrial control systems (ICSs) are extensively utilized worldwide to control and regulate various processes in energy utilities. It consists of various field devices, control and monitoring devices and communication devices. This paper focuses on the testing and analysis of various attack vectors that could potentially occur in a hardware-in-loop (HIL) Industrial Control System (ICS) testbed designed for a 500 MW thermal power plant. In this testbed, four typical process scenarios have been identified that can be manipulated through cyber-attacks, leading to severe issues such as plant shutdown or even explosions. The four significant plant scenarios recognized include minimal coal mill levels and increased temperatures in the classifier, heightened primary airflow to the coal mill, the tripping of an ID fan, and adjustment of the Super-heater temperature to its lowest setting. Also, we utilize the STRIDE threat modeling methodology to accurately represents the elements of Cyber-Physical Systems (CPS), their inter-dependencies, and the potential attack entry points and system vulnerabilities.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100675"},"PeriodicalIF":3.6,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140773883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems ResNet50-1D-CNN:基于传输学习的新型轻量级 resNet50-One-dimensional 卷积神经网络,用于改进网络物理系统的入侵检测
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-02 DOI: 10.1016/j.ijcip.2024.100674
Yakub Kayode Saheed , Oluwadamilare Harazeem Abdulganiyu , Kaloma Usman Majikumna , Musa Mustapha , Abebaw Degu Workneh

The cyber-physical system (CPS) plays a crucial role in supporting critical infrastructure like water treatment facilities, gas stations, air conditioning components, and smart grids, which are essential to society. However, these systems are facing a growing susceptibility to a wide range of emerging attacks. Cyber-attacks against CPS have the potential to cause disruptions in the accurate sensing and actuation processes, resulting in significant harm to physical entities and posing concerns for the overall safety of society. Unlike common security measures like firewalls and encryption, which often aren't enough to deal with the unique problems that CPS architectures present, deploying machine learning-based intrusion detection systems (IDS) that are specifically made for CPS has become an important way to make them safer. The application of machine learning algorithms has been suggested as a means of mitigating cyber-attacks on CPS. However, the limited availability of labelled data pertaining to emerging attack techniques poses a significant challenge to the accurate detection of such attacks. In the given scenario, transfer learning emerges as a promising methodology for the detection of cyber-attacks, as it involves the implicit modelling of the system. In this research, we propose a new lightweight transfer learning method via ResNet50-CNN1D for intrusion detection in CPS. The Adaptive Gradient (Adagrad) optimizer was applied in the proposed model to minimize the loss function through the adjustment of network weight. We tested how well the suggested ResNet50-1D-CNN model worked using the UNSW-NB15 dataset and a control system dataset called HAI. The HAI dataset was taken from the testbed and based on a planned physical attack scenario. By calculating the coefficient scores for the top ten (10) features in the HAI and UNSW-NB15 data, it was possible to determine the relevance of a feature. The rationale behind employing transfer learning was to mitigate the complexity associated with the classification of cyber-attacks and runtime. The utilization of transfer learning resulted in notable reductions in both the training and testing times required for the detection of attacks. On the HAI data, the results showed an accuracy of 97.32 %, recall of 98.41 %, F1-score of 96.32 %, and precision of 97.09 %. On the UNSW-NB15 data, the results showed an accuracy of 99.89 %, recall of 99.09 %, F1-score of 98.01 %, and precision of 98.70 %.

网络物理系统(CPS)在支持水处理设施、加油站、空调组件和智能电网等对社会至关重要的关键基础设施方面发挥着至关重要的作用。然而,这些系统越来越容易受到各种新出现的攻击。针对 CPS 的网络攻击有可能破坏精确的传感和执行过程,从而对物理实体造成重大伤害,并对社会的整体安全构成威胁。防火墙和加密等普通安全措施往往不足以应对 CPS 架构所面临的独特问题,与之不同的是,部署专门针对 CPS 的基于机器学习的入侵检测系统 (IDS) 已成为提高 CPS 安全性的重要途径。有人建议将机器学习算法作为减轻对 CPS 的网络攻击的一种手段。然而,与新兴攻击技术相关的标记数据有限,这给准确检测此类攻击带来了巨大挑战。在这种情况下,迁移学习成为一种很有前途的网络攻击检测方法,因为它涉及系统的隐式建模。在本研究中,我们通过 ResNet50-CNN1D 提出了一种用于 CPS 入侵检测的新型轻量级迁移学习方法。自适应梯度(Adagrad)优化器被应用到所提出的模型中,通过调整网络权重使损失函数最小化。我们使用 UNSW-NB15 数据集和名为 HAI 的控制系统数据集测试了所建议的 ResNet50-1D-CNN 模型的工作效果。HAI 数据集来自测试平台,基于计划的物理攻击场景。通过计算 HAI 和 UNSW-NB15 数据中前十(10)个特征的系数得分,可以确定特征的相关性。采用迁移学习的理由是减轻与网络攻击和运行时间分类相关的复杂性。利用迁移学习可以显著减少检测攻击所需的训练和测试时间。在 HAI 数据上,结果显示准确率为 97.32%,召回率为 98.41%,F1 分数为 96.32%,精度为 97.09%。在 UNSW-NB15 数据上,结果显示准确率为 99.89 %,召回率为 99.09 %,F1 分数为 98.01 %,精确度为 98.70 %。
{"title":"ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems","authors":"Yakub Kayode Saheed ,&nbsp;Oluwadamilare Harazeem Abdulganiyu ,&nbsp;Kaloma Usman Majikumna ,&nbsp;Musa Mustapha ,&nbsp;Abebaw Degu Workneh","doi":"10.1016/j.ijcip.2024.100674","DOIUrl":"https://doi.org/10.1016/j.ijcip.2024.100674","url":null,"abstract":"<div><p>The cyber-physical system (CPS) plays a crucial role in supporting critical infrastructure like water treatment facilities, gas stations, air conditioning components, and smart grids, which are essential to society. However, these systems are facing a growing susceptibility to a wide range of emerging attacks. Cyber-attacks against CPS have the potential to cause disruptions in the accurate sensing and actuation processes, resulting in significant harm to physical entities and posing concerns for the overall safety of society. Unlike common security measures like firewalls and encryption, which often aren't enough to deal with the unique problems that CPS architectures present, deploying machine learning-based intrusion detection systems (IDS) that are specifically made for CPS has become an important way to make them safer. The application of machine learning algorithms has been suggested as a means of mitigating cyber-attacks on CPS. However, the limited availability of labelled data pertaining to emerging attack techniques poses a significant challenge to the accurate detection of such attacks. In the given scenario, transfer learning emerges as a promising methodology for the detection of cyber-attacks, as it involves the implicit modelling of the system. In this research, we propose a new lightweight transfer learning method via ResNet50-CNN1D for intrusion detection in CPS. The Adaptive Gradient (Adagrad) optimizer was applied in the proposed model to minimize the loss function through the adjustment of network weight. We tested how well the suggested ResNet50-1D-CNN model worked using the UNSW-NB15 dataset and a control system dataset called HAI. The HAI dataset was taken from the testbed and based on a planned physical attack scenario. By calculating the coefficient scores for the top ten (10) features in the HAI and UNSW-NB15 data, it was possible to determine the relevance of a feature. The rationale behind employing transfer learning was to mitigate the complexity associated with the classification of cyber-attacks and runtime. The utilization of transfer learning resulted in notable reductions in both the training and testing times required for the detection of attacks. On the HAI data, the results showed an accuracy of 97.32 %, recall of 98.41 %, F1-score of 96.32 %, and precision of 97.09 %. On the UNSW-NB15 data, the results showed an accuracy of 99.89 %, recall of 99.09 %, F1-score of 98.01 %, and precision of 98.70 %.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100674"},"PeriodicalIF":3.6,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140640963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation 增强城市系统抵御地震灾害的能力:相互依存和资源分配的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-04 DOI: 10.1016/j.ijcip.2024.100673
Taiyi Zhao , Yuchun Tang , Qiming Li , Jingquan Wang

During the post-disaster recovery process of the urban system (US), it is critical to understand the interdependencies of critical infrastructure systems (CISs) and strategically allocate resources among them. However, due to the complexity of the problem and the limitations of the perspective, the existing research usually ignores the implicit impact of interdependence and resource allocation on urban resilience. To bridge this gap, this study establishes a multilayer network-based methodological framework to characterize various types of interdependencies between different CISs and integrate the US as a complex “system of systems”. Then, the system functionality of the US under different resource allocation strategies is quantified and optimized by resilience metrics. This proposed framework was demonstrated in a virtual US including a transportation subsystem (TS), an electric power supply subsystem (EPSS), and a community subsystem (CS) under catastrophic earthquakes. The sensitivity of urban resilience to interdependencies is investigated, and the corresponding results reveal that urban resilience is most sensitive to the interdependence between TS and EPSS. In particular, when there exists strong interdependence between the TS and EPSS, the optimal resource allocation strategy to maximize urban resilience is assigning resource allocation coefficients of 0.1, 0.8, and 0.1 for the TS, EPSS, and CS, respectively. These results can be effectively applied in future planning and investment in urban resilience.

在城市系统(US)的灾后恢复过程中,了解关键基础设施系统(CIS)之间的相互依存关系并在它们之间战略性地分配资源至关重要。然而,由于问题的复杂性和视角的局限性,现有研究通常忽略了相互依存和资源分配对城市恢复力的隐性影响。为弥补这一不足,本研究建立了一个基于多层网络的方法框架,以描述不同 CIS 之间的各类相互依存关系,并将美国整合为一个复杂的 "系统之系统"。然后,通过弹性指标对不同资源分配策略下美国的系统功能进行量化和优化。我们在一个虚拟美国中演示了这一拟议框架,其中包括灾难性地震下的交通子系统(TS)、电力供应子系统(EPSS)和社区子系统(CS)。研究了城市复原力对相互依存关系的敏感性,相应的结果表明,城市复原力对 TS 和 EPSS 之间的相互依存关系最为敏感。特别是,当 TS 和 EPSS 之间存在较强的相互依赖关系时,为使城市恢复力最大化,最优的资源分配策略是为 TS、EPSS 和 CS 分别分配 0.1、0.8 和 0.1 的资源分配系数。这些结果可有效地应用于未来城市抗灾能力的规划和投资。
{"title":"Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation","authors":"Taiyi Zhao ,&nbsp;Yuchun Tang ,&nbsp;Qiming Li ,&nbsp;Jingquan Wang","doi":"10.1016/j.ijcip.2024.100673","DOIUrl":"10.1016/j.ijcip.2024.100673","url":null,"abstract":"<div><p>During the post-disaster recovery process of the urban system (US), it is critical to understand the interdependencies of critical infrastructure systems (CISs) and strategically allocate resources among them. However, due to the complexity of the problem and the limitations of the perspective, the existing research usually ignores the implicit impact of interdependence and resource allocation on urban resilience. To bridge this gap, this study establishes a multilayer network-based methodological framework to characterize various types of interdependencies between different CISs and integrate the US as a complex “system of systems”. Then, the system functionality of the US under different resource allocation strategies is quantified and optimized by resilience metrics. This proposed framework was demonstrated in a virtual US including a transportation subsystem (TS), an electric power supply subsystem (EPSS), and a community subsystem (CS) under catastrophic earthquakes. The sensitivity of urban resilience to interdependencies is investigated, and the corresponding results reveal that urban resilience is most sensitive to the interdependence between TS and EPSS. In particular, when there exists strong interdependence between the TS and EPSS, the optimal resource allocation strategy to maximize urban resilience is assigning resource allocation coefficients of 0.1, 0.8, and 0.1 for the TS, EPSS, and CS, respectively. These results can be effectively applied in future planning and investment in urban resilience.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100673"},"PeriodicalIF":3.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140072274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
False data injection in distribution system: Attacker's perspective 分发系统中的虚假数据注入:攻击者的视角
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-02 DOI: 10.1016/j.ijcip.2024.100672
Poornachandratejasvi Laxman Bhattar , Naran M Pindoriya , Anurag Sharma

The distribution system is digitizing and occupying cyberspace with the help of information and communication technologies (ICTs). It is vulnerable to cyber-attacks like false data injection (FDI) and denial-of-services (DoS). However, limited research on cyber-attacks in the distribution system is reported in the literature, and these attacks are of serious concern to distribution system operators (DSOs). The DSO's primary challenge is to understand the attacker's perspective for FDI attack construction. Thus, the work presented in this paper aims to provide an in-depth insight for DSO to apprehend the attacker's perspective, attack flow, and the nature of the FDI attack vector. The prior knowledge of attack flow to DSO can help to protect critical infrastructures from cyber-attacks. Thus, this work comprehends the attacker's behaviour for deploying the optimal budget to disrupt the distribution system operation therein by injecting a stealthy FDI vector. The attacker is resource-constrained in terms of budget and network information. Therefore, the optimal budget for attack initiation is proposed and formulated as a multi-objective optimization problem to minimize the investment and maximize the economic loss for the DSO. Constructing the attack vectors for the attacker is challenging in the limited network information. It is complex because of network characteristics such as multi-phase configurations & an unbalanced nature, and higher resistance to reactance (r/x) ratio. Thus, the FDI attack vector construction is proposed based on non-linear programming optimization and sensitivity analysis considering partial information from the distribution system. The simulation results are presented and compared with available methods in the literature to validate the efficacy of the proposed methods.

在信息和通信技术(ICTs)的帮助下,配送系统正在数字化并占据网络空间。它很容易受到虚假数据注入(FDI)和拒绝服务(DoS)等网络攻击。然而,文献中对配电系统网络攻击的研究有限,这些攻击引起了配电系统运营商(DSO)的严重关切。配电系统运营商面临的主要挑战是如何从攻击者的角度来理解 FDI 攻击的构造。因此,本文介绍的工作旨在为 DSO 提供深入的见解,以了解攻击者的视角、攻击流和 FDI 攻击向量的性质。DSO 事先了解攻击流有助于保护关键基础设施免受网络攻击。因此,本研究了解攻击者的行为,以部署最佳预算,通过注入隐蔽的 FDI 向量破坏其中的配电系统运行。攻击者在预算和网络信息方面受到资源限制。因此,我们提出了发起攻击的最佳预算,并将其表述为一个多目标优化问题,以最小化投资并最大化 DSO 的经济损失。在网络信息有限的情况下,为攻击者构建攻击向量具有挑战性。由于多相配置&amp、不平衡性质和较高的电阻与电抗(r/x)比等网络特性,构建攻击向量非常复杂。因此,在非线性编程优化和敏感性分析的基础上,考虑到配电系统的部分信息,提出了 FDI 攻击向量构造。本文介绍了模拟结果,并与文献中的现有方法进行了比较,以验证所提方法的有效性。
{"title":"False data injection in distribution system: Attacker's perspective","authors":"Poornachandratejasvi Laxman Bhattar ,&nbsp;Naran M Pindoriya ,&nbsp;Anurag Sharma","doi":"10.1016/j.ijcip.2024.100672","DOIUrl":"10.1016/j.ijcip.2024.100672","url":null,"abstract":"<div><p>The distribution system is digitizing and occupying cyberspace with the help of information and communication technologies (ICTs). It is vulnerable to cyber-attacks like false data injection (FDI) and denial-of-services (DoS). However, limited research on cyber-attacks in the distribution system is reported in the literature, and these attacks are of serious concern to distribution system operators (DSOs). The DSO's primary challenge is to understand the attacker's perspective for FDI attack construction. Thus, the work presented in this paper aims to provide an in-depth insight for DSO to apprehend the attacker's perspective, attack flow, and the nature of the FDI attack vector. The prior knowledge of attack flow to DSO can help to protect critical infrastructures from cyber-attacks. Thus, this work comprehends the attacker's behaviour for deploying the optimal budget to disrupt the distribution system operation therein by injecting a stealthy FDI vector. The attacker is resource-constrained in terms of budget and network information. Therefore, the optimal budget for attack initiation is proposed and formulated as a multi-objective optimization problem to minimize the investment and maximize the economic loss for the DSO. Constructing the attack vectors for the attacker is challenging in the limited network information. It is complex because of network characteristics such as multi-phase configurations &amp; an unbalanced nature, and higher resistance to reactance (<span><math><mrow><mi>r</mi><mo>/</mo><mi>x</mi></mrow></math></span>) ratio. Thus, the FDI attack vector construction is proposed based on non-linear programming optimization and sensitivity analysis considering partial information from the distribution system. The simulation results are presented and compared with available methods in the literature to validate the efficacy of the proposed methods.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100672"},"PeriodicalIF":3.6,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140083874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems DSACR:具有自适应网络恢复能力的工业控制系统防御系统
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-09 DOI: 10.1016/j.ijcip.2024.100662
Yi-Wei Ma, Yi-Hao Tu, Chih-Ting Shen

Industrial Control Systems (ICS) security happens often, which makes it hard for many organizations to keep a balance between operational efficiency, system efficiency, and security. A major concern is how to protect information security and make sure that ICS keep working. This study thus presents a defense-based system with adaptive cyber resilience (DSACR). DSACR will optimize the configuration with respect to the three indices of operational efficiency, performance, and security. Whenever an assault event happens, DSACR offers protective solutions depending on the threat level to optimize the security and running costs of recovering ICS. In terms of safety and operation, DSACR is superior to other approaches by 3 % and 11 %, respectively, as shown by the results of the experiments.

工业控制系统(ICS)的安全问题时有发生,这使得许多组织很难在运行效率、系统效率和安全性之间保持平衡。如何保护信息安全并确保 ICS 持续工作是一个主要问题。因此,本研究提出了一种基于防御的自适应网络弹性系统(DSACR)。DSACR 将从运行效率、性能和安全三个方面对配置进行优化。每当攻击事件发生时,DSACR 都会根据威胁程度提供保护方案,以优化恢复 ICS 的安全性和运行成本。实验结果表明,在安全和运行方面,DSACR 比其他方法分别优越 3 % 和 11 %。
{"title":"DSACR: A defense-based system with adaptive cyber resilience for industrial control systems","authors":"Yi-Wei Ma,&nbsp;Yi-Hao Tu,&nbsp;Chih-Ting Shen","doi":"10.1016/j.ijcip.2024.100662","DOIUrl":"10.1016/j.ijcip.2024.100662","url":null,"abstract":"<div><p>Industrial Control Systems (ICS) security happens often, which makes it hard for many organizations to keep a balance between operational efficiency, system efficiency, and security. A major concern is how to protect information security and make sure that ICS keep working. This study thus presents a defense-based system with adaptive cyber resilience (DSACR). DSACR will optimize the configuration with respect to the three indices of operational efficiency, performance, and security. Whenever an assault event happens, DSACR offers protective solutions depending on the threat level to optimize the security and running costs of recovering ICS. In terms of safety and operation, DSACR is superior to other approaches by 3 % and 11 %, respectively, as shown by the results of the experiments.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100662"},"PeriodicalIF":3.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139826085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A watchdog model for physics-based anomaly detection in digital substations 基于物理的数字变电站异常检测看门狗模型
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-17 DOI: 10.1016/j.ijcip.2024.100660
Hussam Tarazi, Sara Sutton, John Olinjyk, Benjamin Bond, Julian Rrushi

The security of cyber–physical systems (CPS) presents new challenges stemming from computations that work primarily with live physics data. Although there is a body of previous research on detection of malware on CPS, more effective designs are needed to address limitations such mimicry attacks and other forms of evasive techniques. Relay algorithms in particular, such as differential and harmonic protection algorithms, are essential to protecting physical equipment such as power transformers from faults. Relay algorithms, though, are often disabled, altered, or otherwise suppressed by malware.

In this paper, we first provide background on the main types of failures that may occur in an electrical power substation after relay algorithms are disabled by malware. We also provide some initial insights into malware methods that involve physics-informed data manipulations, which in turn may lead to power outages and physical damage to power transformers. We then describe the design of a watchdog algorithm that is continuously on the look out for anomalies in the execution time of relay algorithms along with their associated performance counters. We implemented the watchdog approach in Python, and evaluated it empirically on emulations of differential and harmonic protection algorithms on a computing machine.

网络物理系统(CPS)的计算主要使用实时物理数据,这给系统安全带来了新的挑战。虽然之前已有大量关于 CPS 恶意软件检测的研究,但还需要更有效的设计来解决模仿攻击和其他形式的规避技术等限制。尤其是继电器算法,如差分和谐波保护算法,对于保护电力变压器等物理设备免受故障影响至关重要。在本文中,我们首先介绍了继电器算法被恶意软件禁用后,变电站可能发生的主要故障类型。我们还对涉及物理信息数据操作的恶意软件方法提供了一些初步见解,这些方法反过来可能会导致停电和电力变压器的物理损坏。然后,我们介绍了一种看门狗算法的设计,该算法可持续监控中继算法及其相关性能计数器的执行时间是否出现异常。我们用 Python 实现了看门狗方法,并在计算机上对差动和谐波保护算法的仿真进行了实证评估。
{"title":"A watchdog model for physics-based anomaly detection in digital substations","authors":"Hussam Tarazi,&nbsp;Sara Sutton,&nbsp;John Olinjyk,&nbsp;Benjamin Bond,&nbsp;Julian Rrushi","doi":"10.1016/j.ijcip.2024.100660","DOIUrl":"10.1016/j.ijcip.2024.100660","url":null,"abstract":"<div><p><span>The security of cyber–physical systems (CPS) presents new challenges stemming from computations that work primarily with live physics data. Although there is a body of previous research on detection of malware on CPS, more effective designs are needed to address limitations such mimicry attacks and other forms of evasive techniques. Relay algorithms in particular, such as differential and harmonic protection algorithms, are essential to protecting physical equipment such as </span>power transformers from faults. Relay algorithms, though, are often disabled, altered, or otherwise suppressed by malware.</p><p>In this paper, we first provide background on the main types of failures that may occur in an electrical power substation<span> after relay algorithms are disabled by malware. We also provide some initial insights into malware methods that involve physics-informed data manipulations, which in turn may lead to power outages and physical damage to power transformers. We then describe the design of a watchdog algorithm that is continuously on the look out for anomalies in the execution time of relay algorithms along with their associated performance counters. We implemented the watchdog approach in Python, and evaluated it empirically on emulations of differential and harmonic protection algorithms on a computing machine.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100660"},"PeriodicalIF":3.6,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139481770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication 交叉信任:用于跨境身份验证的去中心化 MA-ABE 机制
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-17 DOI: 10.1016/j.ijcip.2024.100661
Jian Chen , Fei Lu , Yuanzhe Liu , Sheng Peng , Zhiming Cai , Fu Mo

With an increasing demand for authenticated data exchange between jurisdictions, ensuring the privacy and security of data interactions is crucial for national security, public health, and economic vitality, becoming a fundamental national infrastructure. Current solutions can be categorized into two types: fully decentralized autonomous systems based on blockchains or centralized solutions that rely on authoritative centers such as certification authorities (CAs). In reality, a balance needs to be struck between guaranteed authority and privacy independence. A certain authority is needed as an authorization guarantee, and decentralization is required to ensure privacy and the independence of the authority. This paper proposes a novel scheme, CT-MA-ABE (Cross-Trust Multiple Authorization Attribute-Based Encryption), to address these issues by implementing MA-ABE for cross-border institutional authorization interactions, utilize blockchain certification authority (BCA) for credibility and encryption-based authorization to protect attribute data privacy. This solution integrates the role of 'notary' in cross-border interactions, addressing the supervision problem in fully decentralized approaches while also considering the trust issue in centralized systems. This paper also introduces the Universal Certificate Authority Pool (UCAP), an innovative hybrid federated authorization method, creatively utilizing the implied authorization conditions of attributes to create a flexible and transitive authorization mechanism based on attribute relationships and extensions, enhancing privacy protection and improving the speed of authorization matrix calculation. The successful deployment of the system between the legal jurisdictions in South China, Zhuhai and Macau as a critical infrastructure component for securing data interactions further demonstrates its effectiveness as a reliable and secure solution.

随着各辖区之间认证数据交换的需求日益增长,确保数据交互的隐私和安全对国家安全、公共卫生和经济活力至关重要,已成为一项基本的国家基础设施。目前的解决方案可分为两类:基于区块链的完全去中心化自治系统或依赖于权威中心(如认证机构)的中心化解决方案。在现实中,需要在保证权威性和隐私独立性之间取得平衡。需要一定的权威作为授权保证,同时需要去中心化来确保隐私和权威的独立性。本文提出了一种新颖的方案 CT-MA-ABE(基于属性的交叉信任多重授权加密)来解决这些问题,该方案通过实现 MA-ABE 来进行跨境机构授权交互,利用区块链认证机构(BCA)来提高可信度,并通过基于加密的授权来保护属性数据隐私。该解决方案整合了跨境交互中的 "公证人 "角色,既解决了完全去中心化方法中的监督问题,又考虑了中心化系统中的信任问题。本文还介绍了通用证书授权池(UCAP)这一创新的混合联合授权方法,创造性地利用属性的隐含授权条件,创建了基于属性关系和扩展的灵活、跨界的授权机制,加强了隐私保护,提高了授权矩阵的计算速度。该系统在华南、珠海和澳门法律管辖区之间的成功部署,作为保障数据交互安全的关键基础设施组件,进一步证明了其作为可靠和安全解决方案的有效性。
{"title":"Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication","authors":"Jian Chen ,&nbsp;Fei Lu ,&nbsp;Yuanzhe Liu ,&nbsp;Sheng Peng ,&nbsp;Zhiming Cai ,&nbsp;Fu Mo","doi":"10.1016/j.ijcip.2024.100661","DOIUrl":"10.1016/j.ijcip.2024.100661","url":null,"abstract":"<div><p>With an increasing demand for authenticated data exchange between jurisdictions, ensuring the privacy and security of data interactions is crucial for national security, public health, and economic vitality, becoming a fundamental national infrastructure. Current solutions can be categorized into two types: fully decentralized autonomous systems based on blockchains or centralized solutions that rely on authoritative centers such as certification authorities (CAs). In reality, a balance needs to be struck between guaranteed authority and privacy independence. A certain authority is needed as an authorization guarantee, and decentralization is required to ensure privacy and the independence of the authority. This paper proposes a novel scheme, CT-MA-ABE (Cross-Trust Multiple Authorization Attribute-Based Encryption), to address these issues by implementing MA-ABE for cross-border institutional authorization interactions, utilize blockchain certification authority (BCA) for credibility and encryption-based authorization to protect attribute data privacy. This solution integrates the role of 'notary' in cross-border interactions, addressing the supervision problem in fully decentralized approaches while also considering the trust issue in centralized systems. This paper also introduces the Universal Certificate Authority Pool (UCAP), an innovative hybrid federated authorization method, creatively utilizing the implied authorization conditions of attributes to create a flexible and transitive authorization mechanism based on attribute relationships and extensions, enhancing privacy protection and improving the speed of authorization matrix calculation. The successful deployment of the system between the legal jurisdictions in South China, Zhuhai and Macau as a critical infrastructure component for securing data interactions further demonstrates its effectiveness as a reliable and secure solution.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100661"},"PeriodicalIF":3.6,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139481710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1